Which of the following can be configured to authenticate and enforce these shell restrictions?
A network security engineer would like to allow authorized groups to access network devices with
a shell restricted to only show information while still authenticating the administrator’s group to an
unrestricted shell. Which of the following can be configured to authenticate and enforce these shell
restrictions? (Select TWO).
Which of the following is best practice when installing a new workstation in a HIPAA environment?
Which of the following is best practice when installing a new workstation in a HIPAA environment?
Which of the following should occur to allow VNC access to the server?
An administrator is unable to connect to a server via VNC.
Upon investigating the host firewall configuration, the administrator sees the following lines:
A INPUT -m state –state NEW -m tcp -p tcp –dport 3389 -j DENY
A INPUT -m state –state NEW -m tcp -p tcp –dport 22 -j DENY
A INPUT -m state –state NEW -m tcp -p tcp –dport 10000 -j ACCEPT
A INPUT -m state –state NEW -m tcp -p tcp –dport 80 -j DENY
A INPUT -m state –state NEW -m tcp -p tcp –sport 3389 -j ACCEPT
Which of the following should occur to allow VNC access to the server?
Which of the following is the MOST likely problem?
A physician’s office is trying to sign in to the EMR/EHR application remotely, and when the physician
clicks on the application icon it does not respond. Which of the following is the MOST likely
problem?
Which of the following statements are true about a surge suppressor?
Which of the following statements are true about a surge suppressor?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following solutions accomplishes the MOST of these goals?
Company A is trying to implement controls to reduce costs and time spent on litigation.
To accomplish this, Company A has established several goals:
Prevent data breaches from lost/stolen assets
Reduce time to fulfill e-discovery requests
Prevent PII from leaving the network
Lessen the network perimeter attack surface
Reduce internal fraud
Which of the following solutions accomplishes the MOST of these goals?
Which of the following record types is a public record?
Which of the following record types is a public record?
which of the following should the security architect take into consideration?
A security architect is seeking to outsource company server resources to a commercial cloud
service provider. The provider under consideration has a reputation for poorly controlling physical
access to datacenters and has been the victim of multiple social engineering attacks. The service
provider regularly assigns VMs from multiple clients to the same physical resources. When
conducting the final risk assessment which of the following should the security architect take into
consideration?
Which of the following is best suited for general cleaning of monitors?
Which of the following is best suited for general cleaning of monitors?
which of the following?
A legal health record is defined as which of the following?
